Back to skill
Skillv1.0.0
ClawScan security
OpenClaw Upgrade Fix · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousApr 26, 2026, 6:16 PM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill's files and instructions match an OpenClaw upgrade/repair tool, but it automatically elevates agent/tool permissions (sets tools.profile='full'), manipulates sensitive local config/backups (including auth-profiles.json), and runs a network install (npm i -g) — behaviors that are coherent for an upgrade tool but pose security-sensitive changes that should be reviewed before use.
- Guidance
- This skill appears to be a legitimate OpenClaw upgrade/fix tool, but it performs several sensitive actions automatically. Before installing or running it: 1) Inspect ~/.openclaw/openclaw.json and auth-profiles.json to understand what will be changed and what secrets may be backed up. 2) Review and, if necessary, remove or modify the code that sets tools.profile='full' — granting 'full' tooling permissions can enable remote code execution or broader agent capabilities. 3) Verify that backing up auth-profiles.json to ~/.openclaw/backups is acceptable (consider encrypting or restricting backup permissions). 4) Confirm you trust the npm package origin before running 'npm i -g openclaw@latest' (perform offline review or pin a known good version). 5) Run the scripts first in a staging/test environment and review logs before applying to production. 6) Note the SKILL.md references smart-backup.sh/openclaw-recovery which are not included — ensure your backup automation is present. If you are uncomfortable with automatic permission elevation or backing up sensitive auth files, do not run these scripts until they are audited/modified.
Review Dimensions
- Purpose & Capability
- okThe name/description claim an upgrade-and-fix utility for OpenClaw 2026.4.x; the included scripts back up ~/.openclaw files, run an npm upgrade, restart the Gateway, clean plugin dirs, and validate/repair config — all consistent with that purpose. The SKILL.md references related skills/scripts not present in this package (e.g., smart-backup.sh/openclaw-recovery), which is a minor inconsistency but not critical.
- Instruction Scope
- noteRuntime instructions and the three scripts operate on the user's home OpenClaw data (~/.openclaw), read/write JSON configs, restart services, and delete plugin directories. These actions are within the upgrade/repair scope, but the scripts also unconditionally set 'tools.profile' to 'full' and copy auth-profiles.json to backups. The SKILL.md and scripts assume control over agent permissions and sensitive files — this is powerful and requires explicit user review before execution.
- Install Mechanism
- noteThere is no install spec in the registry, but the upgrade script performs a runtime network install via 'npm i -g openclaw@latest'. Using npm to fetch the updated product is expected for an upgrade script, however it downloads and executes code from the public npm registry at runtime, which is a non-trivial security action and should be performed only when the package origin and version are trusted.
- Credentials
- concernThe skill declares no environment variables, but it reads and writes sensitive local config files (openclaw.json, auth-profiles.json, various workspace files). Backing up auth-profiles.json may copy authentication material to backups; the script does not encrypt or otherwise protect these backups. Most notably, the scripts force tools.profile='full' — an elevation that broadens allowed tool capabilities (exec/gateway/browser/etc.). That change is disproportionate unless the user explicitly wants to grant full tooling privileges.
- Persistence & Privilege
- concernThe skill does not set always:true and does not modify other skills, but it persistently modifies the OpenClaw configuration to set tools.profile='full', which effectively grants broader privileges to agents/tools going forward. This permanent configuration change is a high-impact side effect and should be explicitly acknowledged and approved by the administrator before running.
